Chapter 8 - Cisco PIX Firewall

This chapter introduces the Cisco PIX firewalls. This information is useful in determining which firewall is appropriate for requirements. The PIX provides a robust firewall that can protect network from attacks, and can also restrict access to legitimate users and services. The PIX goes beyond its...

Full description

Saved in:
Bibliographic Details
Published inThe Best Damn Cisco Internetworking Book Period pp. 819 - 964
Main Authors Charles Riley, Michael E. Flannagan, Ron Fuller, Umer Khan, Wayne A. Lawson, Keith O'Brien, Martin Walshaw
Format Book Chapter
LanguageEnglish
Published Syngress 2003
Online AccessGet full text

Cover

Loading…
More Information
Summary:This chapter introduces the Cisco PIX firewalls. This information is useful in determining which firewall is appropriate for requirements. The PIX provides a robust firewall that can protect network from attacks, and can also restrict access to legitimate users and services. The PIX goes beyond its firewall nature by providing additional services such as encryption for data transported across insecure networks and basic intrusion detection. Cisco PIX firewalls can be configured using a number of methods, including commands and web interfaces. Cisco also provides a graphical user interface for accomplishing most configurations. This chapter also provides information that one can use to build a working PIX design, from initial planning to a robust configuration.
ISBN:1931836914
9781931836913
DOI:10.1016/B978-193183691-3/50025-0